(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Efficient Implementation of a Dataflow Network

Publishing Venue

IBM

Related People

Todd, SJ: AUTHOR

Abstract

In message processing systems having a number of nodes, the flow of a message typically requires each node receiving a message to keep a record of calls to other nodes to which it passes messages, together with essential data relating to the calls made. This can make substantial demands on the processing resources of the node, and it is desirable to ensure that these resources are effectively used. The system described here achieves this by using, for each node, that node's standard method call and subroutine stack mechanism. Each node implements a standard entry point 'AcceptPush'. Any node that wishes to output a message to a set of target nodes does this by calling the 'AcceptPush' entry point for each of the targets in turn.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
52% of the total text.

Efficient Implementation of a Dataflow Network

In message
processing systems having a number of nodes,
the flow of a message typically requires each node receiving a
message to keep a record of calls to other nodes to which it passes
messages, together with essential data relating to the calls made.
This can make substantial demands on the processing resources of the
node, and it is desirable to ensure that these resources are
effectively used. The system described
here achieves this by using,
for each node, that node's standard method call and subroutine stack
mechanism. Each node implements a
standard entry point 'AcceptPush'.
Any node that wishes to output a message to a set of target nodes
does this by calling the 'AcceptPush' entry point for each of the
targets in turn. Each node of the
dataflow is represented by an
object, the class of which depends on the function the node
implements. In particular, this function
is implemented in the
'AcceptPush' method of the class.
'AcceptPush' takes a single
parameter, a reference to the message being passed in. 'AcceptPush'
provides the 'self interpretation' of the dataflow graph. All node
clases are subclasses of a generic DataflowNode class which class
defines a pure virtual 'AcceptPush' function.
The DataflowNode class
implements methods that keep track of the 'wiring' of the dataflow
using a collection member variable that contains reference to all the
target nodes, and further implements a 'Push' method with a message
reference parameter. Push cal...